National Vulnerability Database

National Vulnerability Database

CVE-2017-3735 Detail

Modified

This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.

Current Description

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Analysis Description

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.

Modified Analysis -
11/9/2017 11:01:02 AM

OR
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Changed

CVSS V3

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Changed

Reference Type

https://www.debian.org/security/2017/dsa-4017 No Types Assigned

https://www.debian.org/security/2017/dsa-4017 Third Party Advisory

Changed

Reference Type

https://www.debian.org/security/2017/dsa-4018 No Types Assigned

https://www.debian.org/security/2017/dsa-4018 Third Party Advisory

Changed

Reference Type

https://www.openssl.org/news/secadv/20171102.txt No Types Assigned

https://www.openssl.org/news/secadv/20171102.txt Vendor Advisory

CVE Modified by MITRE -
11/5/2017 9:29:08 PM

Action

Type

Old Value

New Value

Added

Reference

https://www.debian.org/security/2017/dsa-4017 [No Types Assigned]

Added

Reference

https://www.debian.org/security/2017/dsa-4018 [No Types Assigned]

CVE Modified by MITRE -
11/2/2017 9:29:07 PM

Action

Type

Old Value

New Value

Changed

Description

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL since then.

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

CVE Modified by MITRE -
8/30/2017 9:29:01 PM

Action

Type

Old Value

New Value

Changed

Description

While parsing an IPAdressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL since then.

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL since then.